LEADER 03423nam 22005655 450 001 996546842003316 005 20230810230834.0 010 $a981-9911-25-7 024 7 $a10.1007/978-981-99-1125-7 035 $a(CKB)27113436000041 035 $a(MiAaPQ)EBC30603284 035 $a(Au-PeEL)EBL30603284 035 $a(DE-He213)978-981-99-1125-7 035 $a(PPN)272271357 035 $a(EXLCZ)9927113436000041 100 $a20230619d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSpace-Air-Ground Integrated Network Security$b[electronic resource] /$fby Jianwei Liu, Lin Bai, Chunxiao Jiang, Wei Zhang 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (435 pages) 311 $a9789819911240 320 $aIncludes bibliographical references. 327 $aChapter 1 Introduction to SAGIN Security -- Chapter 2 Theory Foundation of SAGIN Security -- Chapter 3 Ground Network Security -- Chapter 4 Airborne Network Security -- Chapter 5 Space Network Security -- Chapter 6 Future Trend of Network Security. 330 $aThis book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs). SAGIN are expected to play an increasingly important role in providing real-time, flexible, and integrated communication and data transmission services in an efficient manner. Today, SAGINs have been widely developed for a range of applications in navigation, environmental monitoring, traffic management, counter-terrorism, etc. However, security becomes a major concern, since the satellites, spacecrafts, and aircrafts are susceptible to a variety of traditional/specific network-based attacks, including eavesdropping, session hijacking, and illegal access. In this book, we review the theoretical foundations of SAGIN security. We also address a range of related security threats and provide cutting-edge solutions in the aspect of ground network security, airborne network security, space network security, and provide future trends in SAGIN security. The book goes from an introduction to the topic?s background, to a description of the basic theory, and then to cutting-edge technologies, making it suitable for readers at all levels including professional researchers and beginners. To gain the most from the book, readers should have taken prior courses in information theory, cryptography, network security, etc. 606 $aComputer networks$xSecurity measures 606 $aData protection 606 $aSecurity systems 606 $aMobile and Network Security 606 $aData and Information Security 606 $aSecurity Science and Technology 615 0$aComputer networks$xSecurity measures. 615 0$aData protection. 615 0$aSecurity systems. 615 14$aMobile and Network Security. 615 24$aData and Information Security. 615 24$aSecurity Science and Technology. 676 $a658.47 700 $aLiu$b Jianwei$01368631 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996546842003316 996 $aSpace-air-ground integrated network security$93552098 997 $aUNISA